Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
dns-326 Vendor: dlink

About This Product

dns-326 is a software product offered by dlink. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The moderate vulnerability count reflects ongoing security research and responsible disclosure practices. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 35 known vulnerabilities affecting dlink dns-326. This includes 1 critical-severity issue and 11 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2024 to 2026, indicating a recent active security attention. 23 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2024-3272 2024-04-04 2025-10-30 9.8 10.0 Likely
CVE-2024-3273 2024-04-04 2025-10-30 7.3 7.5 Likely
CVE-2024-7828 2024-08-15 2024-08-19 8.8 9.0 Likely
CVE-2024-7829 2024-08-15 2024-08-19 8.8 9.0 Likely
CVE-2024-7830 2024-08-15 2024-08-19 8.8 9.0 Likely
CVE-2024-7831 2024-08-15 2024-08-19 8.8 9.0 Likely
CVE-2024-7832 2024-08-15 2024-08-19 8.8 9.0 Likely
CVE-2024-8127 2024-08-24 2024-08-27 6.3 6.5 Likely
CVE-2024-8128 2024-08-24 2024-08-27 6.3 6.5 Likely
CVE-2024-8129 2024-08-24 2024-08-27 6.3 6.5 Likely
CVE-2024-8130 2024-08-24 2024-08-27 6.3 6.5 Likely
CVE-2024-8131 2024-08-24 2024-08-27 6.3 6.5 Likely
CVE-2024-8132 2024-08-24 2024-08-27 6.3 6.5 Likely
CVE-2024-8133 2024-08-24 2024-08-27 6.3 6.5 Likely
CVE-2024-8134 2024-08-24 2024-08-27 6.3 6.5 Likely
CVE-2024-8210 2024-08-27 2024-08-29 6.3 6.5 Likely
CVE-2024-8211 2024-08-27 2024-08-29 6.3 6.5 Likely
CVE-2024-8212 2024-08-27 2024-08-29 6.3 6.5 Likely
CVE-2024-8213 2024-08-27 2024-08-29 6.3 6.5 Likely
CVE-2024-8214 2024-08-27 2024-08-29 6.3 6.5 Likely
CVE-2026-4194 2026-03-16 2026-03-19 7.3 7.5 Likely
CVE-2026-4195 2026-03-16 2026-03-19 6.3 6.5 Likely
CVE-2026-4196 2026-03-16 2026-03-19 6.3 6.5 Likely
CVE-2026-4197 2026-03-16 2026-03-19 6.3 6.5 Likely
CVE-2026-4203 2026-03-16 2026-03-19 6.3 6.5 Likely
CVE-2026-4204 2026-03-16 2026-03-19 6.3 6.5 Likely
CVE-2026-4205 2026-03-16 2026-03-19 6.3 6.5 Likely
CVE-2026-4206 2026-03-16 2026-03-19 6.3 6.5 Likely
CVE-2026-4207 2026-03-16 2026-03-19 6.3 6.5 Likely
CVE-2026-4209 2026-03-16 2026-03-19 6.3 6.5 Likely
CVE-2026-4210 2026-03-16 2026-03-19 6.3 6.5 Likely
CVE-2026-4211 2026-03-16 2026-03-19 8.8 9.0 Likely
CVE-2026-4212 2026-03-16 2026-03-19 8.8 9.0 Likely
CVE-2026-4213 2026-03-16 2026-03-19 8.8 9.0 Likely
CVE-2026-4214 2026-03-16 2026-03-19 8.8 9.0 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for dlink dns-326 by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.